Cryptographic hash function

Results: 1121



#Item
71Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
72TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:39:48
73The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
74NDN, Technical Report NDN-0008, 2012. http://named-data.net/techreports.html Revision 1: October 10, Chronos: Serverless Multi-User Chat Over NDN

NDN, Technical Report NDN-0008, 2012. http://named-data.net/techreports.html Revision 1: October 10, Chronos: Serverless Multi-User Chat Over NDN

Add to Reading List

Source URL: www.named-data.net

Language: English - Date: 2013-08-09 21:32:20
75This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
76The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
77sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract  sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:06:03
786.006 Intro to Algorithms  Recitation 05 February 16, 2011

6.006 Intro to Algorithms Recitation 05 February 16, 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-02-16 17:35:41
79Cryptanalytic Tools  Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-12-11 07:25:27
80High Speed FPGA Implementation of Cryptographic Hash Function by  Olakunle Esuruoso

High Speed FPGA Implementation of Cryptographic Hash Function by Olakunle Esuruoso

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:49